Security

Security | News, how-tos, features, reviews, and videos

5G mobile wireless network technology / connections
Gourav Mukherjee, managing partner, Immersion Security

COVID-19 coronavirus / network of vectors

New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

Governments and companies are using biometrics and geolocation to identify and track potential coronavirus victims in the name of public safety.

Antivirus digital syringe and virus/biohazard symbol in binary matrix

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

How to protect yourself from coronavirus phishing threats

The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them.

Money flows through a tunnel of binary code as a target hovers over a code bug.

Bug bounty platforms buy researcher silence, violate labor laws, critics say

The promise of crowdsourced cybersecurity, fueled by "millions of hackers," turns out to be a pipe dream, despite high-octane marketing from the bug bounty platforms.

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

Weakness in Zoom for macOS allows local attackers to hijack camera and microphone

Zoom's use of insecure system APIs allow attackers to elevate privileges as well.

secured vpn tunnel

What is WireGuard? Secure, simple VPN now part of Linux

The WireGuard VPN offers better performance and a simpler, effective approach to cryptography, and now it's built into Linux 5.6. Is it ready for the enterprise?

youtube thumbnails template 021020
video

What is a deepfake? How to prepare for and respond to this cyber attack

As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern...

IDG Insider Pro  >  Tech Career Ladder [podcast / 3:2 / 2400 x 1600]

Tech Career Ladder podcast: Start your climb to EPIC leader

In Insider Pro’s inaugural Tech Career Ladder podcast, Sandy Silk -- director of Information Security, Education, and Consulting at Harvard University -- joins host Maryfran Johnson to discuss what it takes to become an EPIC leader....

CSO  >  danger / security threat / malware / biohazard symbol in data center / servers

Attack campaign hits thousands of MS-SQL servers for two years

Newly discovered Vollgar attack uses brute force to infect vulnerable Microsoft SQL servers at a high rate.

COVID-19 coronavirus / network of spread vectors

Pandemic impact report: Security leaders weigh in

A new survey of security and IT leaders sheds light on how organizations across industries are dealing with the COVID-19 crisis, how prepared they were, how vulnerable they are, and what the long-term impact may be.

security risk - phishing / malware / social engineering

How to prepare Microsoft Office and Windows for ransomware and email attacks

You've set up your remote workers during this COVID-19 crisis, but have you made the adjustments to be prepared for a cyber disaster like a ransomware attack?

Exiting the computing business

5 reasons security staff leave (and what to do about it)

Retaining skilled security staff is difficult in the best of times, but there are steps you can take that will make a difference.

radar grid overlays the pupil of an eye / intrusion detection / scanning / threat assessment

12 top IDS/IPS tools

An intrusion detection or prevention system can mean the difference between a safe network and a nasty breach. We've rounded up some of the best and most popular IDS/IPS products on the market.

security school education binary code classroom by skynesher getty

Security School: Enroll today and advance your tech career

Insider Pro and CertsNexus have created a virtual classroom where subscribers can learn and test their cybersecurity readiness.

Slack logo / security / network

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

COVID-19 coronavirus [morphology/visualization]

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.

security threats and vulnerabilities

How to protect remote workers from the coronavirus crime wave

As predicted, the coronavirus crisis is bringing out the worst in cybercriminals. But the attacks are really just old exploits modified to exploit the new coronavirus context. Here’s how to beat them.

A vast network of identity avatars. [identity management]

10 identity management metrics that matter

Monitoring these key identity and access management numbers will help you evaluate the performance of your IAM solution.

Load More